011000 The list of codes for a microprocessor’s instruction set is called machine language. (Answer: True)

011100 A microprocessor holds data in the interpreter register. (Answer: False) 011200 A dictionary attack is a virus that hides out in the spelling checker for your word processing software. (Answer: False)

012100 Computers and the digital revolution have changed our lives in many fundamental ways. If you were on the front lines of the digital revolution when computers were first developed to break codes and calculate missile trajectories, you were most likely living in what time period?

a. World War I

b. The roaring twenties

c. World War II

d. The 1960s

(Answer: c)

012200 Today, consumers can choose from a wide variety of digital devices, including personal computers, workstations, videogame consoles, smartphones, iPods, and PDAs. Knowing the strengths of these devices helps you make the right choice. What is the fundamental difference between videogame consoles, personal computers, and smartphones?

a. Video game consoles and smartphones are not be classified as computers because they don’t have stored program capabilities like real computers.

b. Videogame consoles and smartphones fill specialized niches and are not replacements for personal computers.

c. Personal computers and smartphones can be used to access the Internet, whereas videogame consoles cannot.

photos, playing music, and showing movies. What programmers write, however,

is not what a computer actually processes. Why is this the case?

a. Because programmers usually write programs using high-level programming languages that have to be converted into machine language that computers can work with.

b. Because programs are basically outlines that programmers have to fill out using op codes.

c. Because high-level languages are too detailed for computers to process, so programs written in these languages have to be simplified.

d. Because computer programmers make too many errors for programs to run successfully.

(Answer: a)

012500 Security experts stress that the use of “strong” p asswords can prevent identity theft and help to keep your computer files secure. Which of the following passwords is likely to be the most secure? a. 12345 because it is all numbers.

...COMPUTERCONCEPTS
NATIONAL ASSOCIATION FOR THE BLIND
NEW DELHI
ComputerConcepts
Hardware & software concepts explained for persons with low or no vision for the students of Intel Technology Training Lab at National Association for the Blind, New Delhi
Produced and Published by National Association for the Blind
Sector-5, R.K Puram, New Delhi
E-mail: nab@vsnl.com...

...COMPUTERCONCEPTS
A computer is a machine that processes data and performs tasks according to a set of instructions. To do anything, computer must be give specific directions to follow. They get these directions from software. Software, such as that used for word processing, is a set of step-by-step instruction for the computer, written by computer programmers in a programming language like BASIC,...

...MINISTRY OF EDUCATION
FIJI SCHOOL LEAVING CERTIFICATE
EXAMINATION
2012
COMPUTER STUDIES
COPYRIGHT: MINISTRY OF EDUCATION, REPUBLIC OF FIJI, 2012.
2.
MINISTRY OF EDUCATION
FIJI SCHOOL LEAVING CERTIFICATE EXAMINATION – 2012
EXAMINER’S REPORT
COMPUTER STUDIES
GENERAL COMMENTS
A total of 3302 candidates appeared for the Computer Studies examination compared to 3347 in 2011.
There has been a notable increase in the number...

...CIST 1001 Exam 1 Name:
1, According to the textbook authors, what percent of American households play computer or video games? 68%
2. According to the textbook authors, what is a popular file format that document management software uses to save converted documents? PDF
3. According to the textbook authors, what are two major advantages of business suite software? The software assists people in becoming more effective and...

...A computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem.
Conventionally, a computer consists of at least one processing element, typically a central processing unit (CPU), and some form of memory. The processing element carries out arithmetic and logic operations, and...

...﻿UNIVERSITY OF LA VERNE
La Verne, CA
July 25, 2014
Research paper
Computer Security
Submitted in partial fulfillment
of the requirements for the degree
of Master of MBA
Professor Yehia Mortagy
BUS 510 Management of Information Technology
RUI GAO
11560047
College of Business and Public Management
ABSTRACT
In the modern society, information can benefits both groups and individuals in many different areas. Whereas, at the same...

...Skills
Unit 2 Assignment
Modern IT system architectures generally rely on multiple computers that are connected together by networks of communication channels their goals. In most organizations, input data is collected from different locations throughout an organization and then stored, processed, and distributed to other locations within the organizations. Due to the high availability and inexpensiveness of computer hardware and network equipment, it is...